Semester Test + Exam Flashcards

1
Q

Define Information Systems

A

A set of interrelated components that collect (input), manipulate and store (process) and disseminate (output) info and provide a feedback mechanism to help orgs reach objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Provide characteristics of valuable info

A

-Reliable
-Flexible
-Accurate
-Complete
-Accessible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Computer-based Info Systems

A

-A single set of hardware, software, databases, telecommunications, ppl and procedures that are configured to collect, manipulate, store and process data into info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet has 2 parts

A

-Intra (within)
-Extra (outside)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Enterprise Resource Planning (ERP)

A

-A set of integrated programs capable of managing a Co’s vital business operations for an entire multisite, global org

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of E-commerce

A

-B2B
-B2C
-C2C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Ai

A

-Ability of computer systems to mimic/duplicate the functions/characteristics of the human brain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Illustrate the systems development cycle

A
  1. Systems investigation
  2. Systems analysis
  3. Systems design
  4. Systems implementation
  5. Systems maintenance and review
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define an org

A

-A collection of ppl and other resources established to accomplish goals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the global challenges of Info Systems

A

-Cultural challenges
-Language challenges
-Time and distance challenges
-Infrastructure challenges
-Trade agreements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List the type of org structures

A

-Traditional
-Project and Team
-Virtual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define Business Process Reengineering (BPR)

A

Radical redesign of business processes, org structures, ISs and values of orgs to achieve a breakthrough in business results

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define Continuous Improvement (CI)

A

Constantly seeking ways to improve business processes and add value to the products and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Differentiate btwn BPR and CI

A

-BPR
>Often led by outsiders
>Top-down change driven by senior execs
-CI
>Usually let by workers close to the org
>Bottom-up change driven by workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to achieve success w/ IS

A

-Align IS w/ company goals
-Commitment by SM
-Strong project management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define competitive adv

A

Ability of a firm to outperform in its industry

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the 5 forces in Porter’s 5 Force Model

A

-Pwr of Substitutes
-Pwr of Suppliers
-Pwr of Buyers
-Threat of new entrants
-Rivalry among existing comp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define and Org structure

A

The formal pattern that indicate how people and jobs are grouped together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define Management ISs (MIS)

A

-An organized collection of ppl, procedures, software, databases and devices that provide routine info to managers and decision makers
-They focus on operational efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What re the 4 tools of competitive adv

A

-SWOT analysis
-Porters 5 Forces Model
-Porters 3 Generic Strategies
-Value Chain Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define Supply Chain Management

A

-The management of info flows btwn and among acts in a supply chain to maximize total supply chain effectiveness and profitability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What r the 5 supply chain acts

A

-Plan
-Source
-Make
-Deliver
-Return

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define CPU

A

Part of the computer that consists of 3 associated elements;
>the Arithmetic/Logical Unit (ALU)
>the Control unit
>the register areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the Arithmetic/Logical Unit

A

Part of the CPU that performs mathematical calcs and makes logical comparisons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
What is the control unit in the CPU
Part in CPU that sequentially accesses program insttructions, decodes them and coordinates the flow of the data in and out of the ALU, the registers and the primary and various output devices
25
What are registers in the CPU
High speed storage unit used to temporarily hold small units of program and data immediately before, during and after execution by the CPU
26
Define Primary storage/Main memory
Part of the computer that holds program instructions and data
27
How do hardware components act
-Step 1: Fetch instruction -Step 2: Decode instruction -Step 3: Execute instruction -Step 4: Store results Step 1 + 2 = instruction time (i-time) Step 3 + 4 = execution time (e-time)
28
The systems responsible for processing, (CPU and Memory) are called the...
System unit
29
Machine cycle time is measures in
Nanoseconds and picoseconds
30
Clock speed is measured in
MegaHertz and GigaHertz Faster the clocl speed, more heat is generated
31
What is RAM
-A from of memory in which instructions are temp stored -RAM chips are volatile meaning they lose their contents if the current is turned off/disrupted
32
What is ROM
-A non-volatile form of memory that provides permanent storage for data and instructions that do not change
33
Define grid computing
The use of a collection of computers to work in a coordinated manner to solve a common problem
34
Define secondary storage
Devices that store large amounts of data, instructions and info more permanently than allowed w/ main memory
35
What are adv of secondary storage
-Non-volatile -Greater capacity -Greater economy (less expensive)
36
What are examples of Secondary storage devices
-Magnetic -Optical -Solid State
37
Your friend hands you a piece of paper with the number 12091991 on it and tells you this is her birthday. Since your friend gave you birthday gifts on your birthday in the past two years, you know you should give her a birthday gift. This is ________. Information Wisdom Data Knowledge
The number 12091991 is **information** because it represents a specific fact or piece of data, in this case, your friend's birthday. Information becomes useful when it's processed or interpreted, such as recognizing it as a date.
38
_______ is a program or instructions that tells the hardware what to do. A software An application software A telecommunication A database
A **software** is a program or instructions that tells the hardware what to do. While application software is a type of software, the broader term "software" encompasses all types of programs, including operating systems, utilities, and applications.
39
______ is a program or instructions that allow people to complete tasks. An application software A telecommunication An operating system A database
An **application software** is a program or instructions that allow people to complete tasks.
40
Your friend hands you a piece of paper with the number 12091991 on it and tells you this is her birthday. This is ________. Data Knowledge Wisdom Information
This is **data**. In this context, the number 12091991 by itself is raw and unprocessed, making it data. When interpreted as a date, it becomes information.
41
When choosing from various types of flat panel display, choose _______ for low power consumption. light-emitting diode (LED) liquid crystal display (LCD) organic LED plasma
LCD
42
Carson's supervisor has asked him to review a variety of portable computers for possible purchase for their company's employees. Which of the following should Carson NOT consider buying? nettops laptops tablets notebooks
Carson should not consider buying **nettop** computers for the company's employees. Nettops are small, low-power desktop computers, which are not portable like laptops, tablets, or notebooks. Since his supervisor is asking him to review portable computers, nettops would not meet the portability requirement.
43
A redundant array of independent/inexpensive disks (RAID) is a method of storing data so that data can be accessed more quickly. True False
**True**. A redundant array of independent/inexpensive disks (RAID) is a method of storing data across multiple hard drives to improve performance, increase storage capacity, and provide redundancy. Depending on the RAID level, it can allow data to be accessed more quickly and offer protection against data loss in case of drive failure.
44
Windows 10 is an example of application software. True False
**False**. Windows 10 is an example of system software, not application software. System software includes operating systems like Windows 10, which manage the hardware and software resources of a computer and provide services for application software. Application software, on the other hand, refers to programs designed for end-users to perform specific tasks, such as word processors, web browsers, and games.
45
Linux is an open-source operating system. True False
**True**. Linux is an open-source operating system. This means its source code is freely available for anyone to view, modify, and distribute.
46
__ is an approach that starts by investigating the general data and information needs of an organization at the strategic level and then examines more specific data and information needs for the functional areas and departments within the organization. Social graph analysis Data selecting Data cleansing Enterprise data modelling
The correct answer is **Enterprise data modeling**. Enterprise data modeling is an approach that begins by assessing the general data and information needs of an organization at a strategic level, and then delves into more specific data and information requirements for functional areas and departments within the organization. This process ensures that data structures align with the overall goals and operations of the enterprise.
47
When there is a delay between an event and the eventual processing of the data, it is called batch processing. True False
**True**. Batch processing refers to executing a series of data-processing tasks all at once after a delay, rather than immediately. The delay between the event and processing is a key characteristic of batch processing.
48
The ability to capture and analyze all customer interactions, generate appropriate responses, and gather data to create and build effective and efficient marketing campaigns is known as contact management. True False
**False**. The ability to capture and analyze customer interactions, generate responses, and gather data for marketing campaigns is typically referred to as **Customer Relationship Management (CRM)**, not contact management. Contact management is more about organizing and managing customer contact information.
49
In a manufacturing enterprise resource planning (ERP) system, demand management _______. creates sales forecasts based on historical data determines detailed production schedules determines the amount and timing for placing raw material orders with suppliers determines the amount of weekly or daily production needed to meet the demand for individual products
In a manufacturing enterprise resource planning (ERP) system, demand management **creates sales forecasts based on historical data**. Demand management in ERP systems involves predicting future customer demand to inform production planning, inventory management, and supply chain operations.
50
Legacy systems typically run on the latest hardware True False
**False**. Legacy systems usually run on outdated or older hardware.
51
___ is a communication standard that enables computers to route communications traffic from one network to another as needed. the ARPANET A Uniform Resource Locator (URL) The Internet Protocol (IP) A wi-fi
The **Internet Protocol (IP)** is the communication standard that enables computers to route communications traffic from one network to another as needed.
52
Twisted pair wiring transmits data faster than coaxial cabling, but is more expensive than coaxial cable. True False
**False**. Twisted pair wiring generally transmits data slower than coaxial cabling and is also less expensive than coaxial cable.
53
An exception report will automatically be produced by an MIS when a situation is unusual or requires management action. True False
**True**. An exception report in a Management Information System (MIS) is typically generated automatically when certain predefined criteria are not met, indicating an unusual situation or one that requires management attention.
54
CAM, CIM and FMS are examples of _______ technologies. Process control Web analytics Internet access Quality control
**Process control** CAM (Computer-Aided Manufacturing), CIM (Computer-Integrated Manufacturing), and FMS (Flexible Manufacturing System) are examples of process control technologies used in manufacturing to automate and optimize production processes.
55
Which of the following systems is capable of manipulating and displaying data that is identified according to its location? Sense and respond system Geographic information system Functional information system Decision support system
**Geographic Information System (GIS)**. A Geographic Information System (GIS) is specifically designed to capture, manipulate, analyze, manage, and display spatial or geographic data.
56
In an expert system, the _____ is the component that delivers the expert advice. knowledge acquisition facility explanation facility inference engine user interface
**Inference engine**. In an expert system, the inference engine is the component that processes the knowledge stored in the knowledge base to deliver expert advice or make decisions.
57
Sophisticated computer systems that allow electronic machines to navigate through physical spaces require an extension of understanding visual images. This is called a _____ system. virtual reality perceptive learning robotic
**Perceptive**. A perceptive system extends the capability of computers and machines to understand and interpret visual images, enabling them to navigate and interact within physical spaces effectively.
58
The domain expert is the programmer (or group of programmers) who are responsible for maintaining the knowledge base of an expert system. True False
**False**. The domain expert is the individual with specialized knowledge in a particular area, not the programmer. The domain expert provides the expertise that is encoded into the knowledge base of the expert system, while the programmers or knowledge engineers are responsible for maintaining and implementing the knowledge base.
59
If Stan and Marcus, a new trainee at the manufacturing plant, are working together to resolve an issue on the line, they would be transferring Stan's tacit knowledge to Marcus. True False
**True**. When Stan, who likely has experience and expertise, works with Marcus, a new trainee, to resolve an issue, he is transferring his tacit knowledge. Tacit knowledge is the unwritten, unspoken, and hidden vast storehouse of knowledge held by practically every normal human being, based on his or her experiences, insights, and intuition.
60
_____ can process many pieces of data at the same time and learn to recognize patterns. Neural networks Voice recognition systems Natural language processing systems Learning systems
**Neural networks**. Neural networks are a type of artificial intelligence that can process large amounts of data simultaneously and learn to recognize patterns, making them particularly effective for tasks like pattern recognition, classification, and prediction
61
What are characteristics of MIS
-Provide reports w/ fixed and standard formats -Produce hardcopy and softcopy reports -Allows users to determine their own custom reports -Use internal data stored in the computer system
62
Define Decision Support Systems (DSS)
An organized collection of ppl, procedures, databases, software an devices used to make decisions an d solve problems
63
Characteristics of DSS
-Provide rapid access to info -Handle large amounts of data from different sources -Provide report and presentation flexibility -Offer textual and graphical orientation
64
What is the purpose of ERP
-Plan production -Control inventory -Manage purchasing process
65
What is E-Govt
Use of info and comms tech to simplify the sharing of info, speed up formerly paper-based processes and improve the relationship btwn citizen and govt
66
What is a primary key
A field in a table that is unique to each record in the table
67
Adv and Disadv of database approach
**ADV** -Improved data integrity -Reduced data redundancy -Easier modification and updating -Better overall protection of data **DISADV** -More complexity -More expensive -More difficult to recover from a failure
68
What is data mining
Process of analyzing data to try discover patterns and relationships w/in the data
69
In the metaverse, humans may be represented by a virtual self that is called an ____________ or a software agent. avatar immersive self agent Smith automated self
**Avatar**
70
3D printing has many advantages and reasons why we can use it. 3D printing allows: Quicker idea testing Easier customisation of a product Understand TinkerCad better Print 10000 products Poor infrastructure
- **Quicker idea testing** - **Easier customization of a product**
71
The term _________ refers to computing technology that is worn on the body. expert echnology wearable computing/technology mobile computing tangible media
wearable computing/technology
72
A(n) _______ is a combination of a whiteboard and a PC.
interactive whiteboard
73
A wiki is a(n) _________ that can be edited by any authorized user.
web page
74
A(n) _________is an online diary, used by people to document their daily experiences.
blog
75
A(n) ___________is an audio broadcast over the Internet.
podcast
76
__________ uses information about a customer’s behaviour, preferences, needs, and buying patterns to customize the entire relationship with that customer
technology-enabled relationship management
77
A(n) ____________allow consumers to place and pay for orders from wherever they happen to be.
smartphone
78
Credit and debit cards are a form of _________
e-money.
79
Manufacturers can raise profitability and improve customer service by moving their supply chain operations onto the Internet. True False
- **True** - Manufacturers can raise profitability and improve customer service by moving their supply chain operations onto the Internet, as it allows for better communication, efficiency, and real-time tracking.
80
One possible application of wearable computing is the incorporation of GPS technology in an item of clothing. True False
- **True**
81
Which of the following is the most common method of 3D printing? SLA (Stereolithography) FDM (Fused Deposition Modeling) DLP (Digital Light Processing) SLS (Selective Laser Sintering)
- **FDM (Fused Deposition Modeling)** - it is widely used due to its accessibility, affordability, and versatility, making it popular among hobbyists and professionals alike.
82
What is one of the primary advantages of 3D printing compared to traditional injection molding? Higher cost for printing complex parts Longer turnaround time Ability to create prototypes quickly and affordably Limited access to medical products
**ability to create prototypes quickly and affordably**
83
In the traditional model of the SDLC, the question ‘what must the information system do to solve the problem?’ is answered in the ____ phase. systems analysis systems implementation systems design systems investigation
- **systems analysis** - This phase focuses on understanding the requirements and needs of the system to address the identified problems.
84
The primary advantage of JAD is that ____. systems can be developed more quickly with significant cost savings the company’s strategic business needs are emphasized, and the mechanics of the system are not stressed the decelerated time cycle allows more time to develop quality, consistency, and design standards it involves frequent group meetings which result in stronger organizational commitment to the project
**it involves frequent group meetings which result in stronger organizational commitment to the project**
85
A(n) ____ shows how users interact with the system when participating in a particular business process. use case model data model activity model network model
**use case model**
86
Systems analysts use a(n) ____ to model the objects, associations and activities that are necessary to complete a business process. data-flow diagram use case model grid chart network model
**data-flow diagram**
87
In the traditional model of the SDLC, the question ‘what is the problem that needs to be solved?’ is answered in the ____ phase. systems implementation systems design systems analysis systems investigation
**systems investigation**
88
The RAD process expands on traditional methods, and as a result, the new system is built, delivered, and placed in operation much later. True False
- **False** - The Rapid Application Development process is designed to accelerate the development and delivery of systems, allowing for quicker builds, deliveries, and placements into operation compared to traditional methods. - RAD emphasizes speed and flexibility, often involving iterative development and user feedback to shorten the overall timeline.
89
JAD provides a fast-track approach to a full spectrum of system development tasks, including planning, design, construction, and implementation. True False
- True
90
Joint application development (JAD) is a compressed version of the traditional SDLC. True False
- **False** - (JAD) is not a compressed version of the traditional SDLC; rather, it is a collaborative approach that focuses on gathering requirements and refining system design through workshops and direct stakeholder involvement. - While it may speed up certain phases of the SDLC, it does not compress the entire lifecycle but rather enhances communication and engagement throughout the process.
91
Because of the limited range of input and interaction among participants, few companies believe that a JAD group produces the best definition of a new system. True False
- **False**
92
A hot site is a computer environment that includes rooms, electrical service and telecommunication links, but no hardware. True False
- **False** - A hot site includes not only rooms, electrical service, and telecommunication links but also the necessary hardware, software, and data to resume operations immediately after a disaster.
93
Before a new system is developed, it is important to identify the strengths and weaknesses of the existing system so that any shortcomings can be addressed. True False
True
94
Pressure to increase profitability and improve operational efficiencies often drives organizations to implement new approaches and technology. True False
True
95
Which phase takes all the detailed design documents from the design phase and transforms them into the actual system? Testing phase Analysis phase Development phase Planning phase
- **Development phase** - Development phase, the detailed design documents from the design phase are used to build and implement the actual system, including coding, system integration, and creation of databases or software components. - This phase focuses on transforming the system design into a functional system.
96
__ creates a complete set of technical specifications that can be used to construct an information system. Systems design Systems investigation Systems analysis Systems development
Systems design
97
Which of the following is a useful policy to minimize waste and mistakes? Changes to HTML and URLs should be documented and authorized by end users. System report titles should be as brief as possible and should simply indicate the report number. Users should implement proper procedures to ensure correct input data. Tight control should be avoided over critical tables.
Users should implement proper procedures to ensure correct input data.
98
A program that disguises itself as a useful application but does something malicious that a user does not expect is ________. an app a trojan horse a social programme a worm
- **trojan horse**
99
_ states the principles and core values that are essential to a set of people and that, therefore, govern these people's behaviour. Code of ethics Code of conduct Code of civil procedure Code of criminal procedure
Code of ethics
100
Computer-related mistakes include organizations operating unintegrated information systems and acquiring redundant systems. True False
True
101
Human error rather than hardware or software failure is the most common cause of information technology problem. True False
True
102
Which of the following statements about UCD is incorrect? Designers design for the average user Empirical measurements carried out throughout the design process Iterative design Assumptions validated through testing
Designers design for the average user.
103
You opened a new word document document and the delete, previous and next options on the "Review" tab are greyed out. This is an example of ________ The implementation of the constraint principle The violation of visibility principle The violation of affordance principle The implementation of memorability principle
This is an example of the implementation of **the constraint principle**.
104
UX evaluators are interested in answering the question of __________ How engaging is a system? How intuitive is a system? How memorable is a system? How efficient is a system?
"How intuitive is a system?"
105
The "Safety" goal in HCI refers to which one of the following? Mechanisms built in to safely store usernames and passwords Mechanisms built into the system to remove all errors Mechanisms built into the system to remove users who have a virus on their computers Mechanisms built into the system to reduce inadvertent errors by users
Mechanisms built into the system to reduce inadvertent errors by users.
106
Organisations can use social media to monitor online conversations. This is called ________ Social listening Managing brand Meeting customers’ expectations Keeping customers informed
Social listening
107